Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
More Resources
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
Add All On Page to My List
Subjects (1-23 of 23)
Computer security -- Standards.
1
2020
The Cybersecurity Maturity Model Certification (CMMC) : a Pocket Guide
Gamble, William.
Ely, Cambridgeshire : IT Governance Publishing, 2020.
available online
Save to My List
Full Record
More Resources
2
2022
Fundamentals of adopting the NIST cybersecurity framework
Moskowitz, David, author.
Norwich, [England] : TSO (The Stationery Office), [2022]
available online
Save to My List
Full Record
More Resources
3
2020
Implementing an information security management system : security management based on ISO 27001 guid
Chopra, Abhishek, author.
[California] : Apress, [2020]
available online
Save to My List
Full Record
More Resources
4
2019
Information security risk management for ISO 27001/ISO 27002
Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, [2019]
available online
Save to My List
Full Record
More Resources
5
2013
An Introduction to information security and ISO27001:2013 : a pocket guide
Watkins, Steve G.
Ely, UK : IT Governance Pub., 2013.
available online
Save to My List
Full Record
More Resources
867854359
6
2016
ISO 9001 : 2015 : a pocket guide
Watkins, Steve, 1970- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2016.
available online
Save to My List
Full Record
More Resources
949907912
7
2019
ISO 27001 controls : a guide to implementing and auditing
Kenyon, Bridget, author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2019.
available online
Save to My List
Full Record
More Resources
8
2020
ISO/IEC 27701:2019 : an introduction to privacy information management
Shipman, Alan, 1946- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2020.
available online
Save to My List
Full Record
More Resources
9
2023
ISO/IEC 27701:2022 : an introduction to information security and the ISMS standard
Watkins, Steve, 1970- author.
[Place of publication not identified] : IT Governance Publishing, 2023.
available online
Save to My List
Full Record
More Resources
10
2019
ISO/IEC 38500 : a pocket guide
Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2019.
available online
Save to My List
Full Record
More Resources
11
2008
ISO/IEC 38500 : the IT governance standard
Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2008.
available online
Save to My List
Full Record
More Resources
609854797
12
2013
ISO27001/ISO27002 : a pocket guide
Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2013.
available online
Save to My List
Full Record
More Resources
951546216
13
2022
Linux security and hardening
[Shelter Island, New York] : Manning Publications, 2022.
available online
Save to My List
Full Record
More Resources
14
2023
Mastering Linux security and hardening : a practical guide to protecting your Linux system from cybe
Tevault, Donald A., author.
Birmingham, UK : Packt Publishing Ltd., 2023.
available online
Save to My List
Full Record
More Resources
15
2018
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, mal
Tevault, Donald A., author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
16
2017
Neuf étapes vers le succès : un aperçu de la mise en oeuvre de la norme ISO 27001:2013
Calder, Alan, author.
[Place of publication not identified] : IT GOVERNANCE LTD, 2017.
available online
Save to My List
Full Record
More Resources
994057237
17
2016
Nine steps to success : an ISO 27001:2013 implementation overview
Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, [2016]
available online
Save to My List
Full Record
More Resources
949716876
18
2017
Nine steps to success : an ISO 27001:2013 implementation overview
Calder, Alan, 1957- author.
Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2017.
available online
Save to My List
Full Record
More Resources
19
2018
Nine steps to success : an ISO27001:2013 implementation overview
Calder, Alan, 1957- author.
[United States] : IT Governance Publishing, 2018.
available online
More...
Save to My List
Full Record
More Resources
20
2017
Nueve pasos para el éxito : una visión de conjunto para la aplicación de la ISO 27001:2013
CALDER, ALAN.
[Place of publication not identified] : IT GOVERNANCE LTD, 2017.
available online
Save to My List
Full Record
More Resources
994073095
21
2009
Security in a Web 2.0+ world : a standards based approach
Solari, C. (Carlos)
Chichester, West Sussex : Wiley, 2009.
available online
Save to My List
Full Record
More Resources
608494199
22
2002
Trusted Computing Platforms: TCPA Technology in Context
Pearson, Siani, author.
[Place of publication not identified] : Pearson, 2002.
available online
Save to My List
Full Record
More Resources
23
2003
Using the common criteria for IT security evaluation
Herrmann, Debra S.
Boca Raton, Fla. : Auerbach Publications, ©2003.
available online
Save to My List
Full Record
More Resources
61106843
locate in results
More Information
Find another book like this
Computer security -- Government policy.
at
Novelist
Return to Browse
Search: